Ensure that storage service-level administrators can't delete the resources they manage in order to prevent accidental or malicious data loss, thereby maintaining data integrity and availability. This separation of duties is essential for robust security and operational stability.
Enforce the separation of duties principle by ensuring storage service-level administrators cannot delete the resources they manage. This tight control is achieved by verifying policy statements contain an explicit condition restricting their delete privileges. Consequently, administrators can only manage, but not destroy, resources for their specific service. The following policy statements demonstrate how non-deletion privileges are enforced for storage service-level administrators:
- Allow group VolumeAdmins to manage volumes in tenancy where request.permission!='VOLUME_DELETE'
- Allow group VolumeAdmins to manage volume-backups in tenancy where request.permission!='VOLUME_BACKUP_DELETE'
- Allow group BucketAdmins to manage objects in tenancy where request.permission!='OBJECT_DELETE'
- Allow group BucketAdmins to manage buckets in tenancy where request.permission!='BUCKET_DELETE'
- Allow group FileAdmins to manage file-systems in tenancy where request.permission!='FILE_SYSTEM_DELETE'
- Allow group FileAdmins to manage mount-targets in tenancy where request.permission!='MOUNT_TARGET_DELETE'
- Allow group FileAdmins to manage export-sets in tenancy where request.permission!='EXPORT_SET_DELETE'
Audit
To check for policies that enforce non-deletion privileges for storage service-level administrators, perform the following operations:
Remediation / Resolution
To ensure that storage service-level administrators can't delete the resources they manage, perform the following operations:
References
- Oracle Cloud Infrastructure Documentation
- Managing Policies
- Identity and Access Management FAQ
- Protect Data at Rest
- Oracle Cloud Infrastructure CLI Documentation
- compartment list
- policy list
- policy get
- policy update